[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#953005: marked as done (buster-pu: package serverspec-runner/1.2.2-1+deb10u1)



Your message dated Sat, 09 May 2020 11:53:52 +0100
with message-id <fd7fa4d56896c35aab49a5a51cb69727dc60e87a.camel@adam-barratt.org.uk>
and subject line Closing requests included in 10.4 point release
has caused the Debian Bug report #953005,
regarding buster-pu: package serverspec-runner/1.2.2-1+deb10u1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
953005: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953005
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian.org@packages.debian.org
Usertags: pu

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

This update is to fix #939645 [1]. The debdiff is attached. The issue has
already been fixed in unstable.

[1] https://bugs.debian.org/939645

Regards, Daniel

- -- System Information:
Debian Release: bullseye/sid
  APT prefers unstable
  APT policy: (990, 'unstable'), (500, 'testing'), (500, 'stable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 5.3.0-3-amd64 (SMP w/8 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)

-----BEGIN PGP SIGNATURE-----
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=uJcm
-----END PGP SIGNATURE-----

--- End Message ---
--- Begin Message ---
Package: release.debian.org
Version: 10.4

Hi,

Each of the uploads referred to by these bugs was included in today's
stable point release.

Regards,

Adam

--- End Message ---

Reply to: